Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
2e4dc51d67c3109a6aef4a554fd245b1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e4dc51d67c3109a6aef4a554fd245b1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2e4dc51d67c3109a6aef4a554fd245b1_JaffaCakes118.html
-
Size
20KB
-
MD5
2e4dc51d67c3109a6aef4a554fd245b1
-
SHA1
7e000aebc86f938f0c8acefc707c73e5a44801cd
-
SHA256
8efbe8180652697a46e43bd4f46833ad34aa59521e05be49f76ed70d4b209dd6
-
SHA512
f425bc7b0d48ec9239c2686a8bb8e110bd64b12039c60e4c9e325da6df518d8b72c2171e225295528e6e231343e3243736d415312d903e0743ee544d27ce688e
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI/49zUnjBhfR82qDB8:SIMd0I5nvHlsvfaxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 5040 msedge.exe 5040 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 1396 5040 msedge.exe 82 PID 5040 wrote to memory of 1396 5040 msedge.exe 82 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 1236 5040 msedge.exe 83 PID 5040 wrote to memory of 4364 5040 msedge.exe 84 PID 5040 wrote to memory of 4364 5040 msedge.exe 84 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85 PID 5040 wrote to memory of 452 5040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e4dc51d67c3109a6aef4a554fd245b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc8bf46f8,0x7fffc8bf4708,0x7fffc8bf47182⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4204299980510543363,3252985118414927696,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,4204299980510543363,3252985118414927696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,4204299980510543363,3252985118414927696,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4204299980510543363,3252985118414927696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4204299980510543363,3252985118414927696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4204299980510543363,3252985118414927696,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5046b48ee5a95b478ca281be4efbfd4a8
SHA1d930380a9c2dfc21c8789d3592a0cd046f467c2a
SHA2563ed87c40c147ee37a0c4f6b25cb9008b074f9d3c9ac39a1f1273398a8a68c668
SHA51269d09e6a0b2949f150da1f46a64f74d69d54c8a53d371ce74d91eff15602b9a2276f60f1a7d61c3dd55489dd64bebe20b6987456ad9d77bf9fb8f4b477a46bc8
-
Filesize
6KB
MD5ee5f391d42447ae5b61e49a9040d3764
SHA1ed8fa0c86aea9afa49136f255e3528eec32dd69d
SHA25646107f3b78764a8f1652c436a7be49428ca3b035d107eae2e19d5a11db137bde
SHA512c1e208b41be4372e11f438a154e52e7a87677823244c933543334ea7e3ffc337b3e5fea4764b715e2e6a392cec2a127b97f36d8509b2b562b1096c82f9851dc7
-
Filesize
6KB
MD59c8a8e55d0fcb81bb5548bfc4438e131
SHA1d31611420a25790f0910c8c4a22c33357ea38c0e
SHA256e345a41fb64b9bb33460fc93ca97ea13dcb27dbe37cd62efe6d78f6524ab4377
SHA5122af5459e71c045a8ec4a29f5dbaa7f238deab357490fe62a42009c5e3e2896be0c9695bcc05458a54ef9d23f528273f24d044158bd9fae1b56542fd8cb945712
-
Filesize
11KB
MD5f49e5977d2694bfb15eeafa56e2d5229
SHA1d13a6826c415bef439da1a16b96cafa5378aa435
SHA2565504da3eca41ef700065f6cb5d8e67fc49bddcd4d9f40d740b8b8943672fb1e2
SHA51270af6c5cd859dd69bfcd85462fb13824aab5c335b513d13a40356eb3c5b5f6911f3f89a431d07623f54869d2a30eb48e6e63c2db483eebb9c62582c1a5b8f8d7